The atec Debug plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation on the 'debug_path' parameter in all versions up to, and including, 1.2.22. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Metrics
Affected Vendors & Products
References
History
Thu, 04 Sep 2025 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The atec Debug plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation on the 'debug_path' parameter in all versions up to, and including, 1.2.22. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). | |
Title | atec Debug <= 1.2.22 - Authenticated (Administrator+) Arbitrary File Deletion | |
Weaknesses | CWE-36 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-09-04T04:23:47.557Z
Reserved: 2025-08-26T23:18:49.599Z
Link: CVE-2025-9518

No data.

No data.

No data.

No data.